Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
Click on a link below for information on how you can ensure your IT systems comply with security standards. .
The latest research from Blueliv has found that the number of compromised credentials detected in North American botnets grew 141% from the last quarter.
Dow Jones & Company has accidentally leaked the personal details and financial information of at least 2.2 million of its customers, but security experts believe this number is said to increase.
China’s controversial Cyber Security Law (CSL) that’s had foreign companies panicking to figure out how to get compliant will take effect tomorrow, June 1, 2017.
As we enter the New Year, organizations globally are accessing the biggest security threats set to impact their organization and developing risk management strategies to help ward off cyber threats.
New York Governor, Andrew Cuomo, introduced new cybersecurity proposals in his January State of the State address following the recent DNC hack and Russia’s attempt to influence the 2016 election in favor of Republican Donald Trump.
The online identities of thousands of Britons are currently available for purchase on the Darknet, with thousands infiltrated from government databases.
It has been claimed in a recent report carried out by Allianz Global, that cyber-crime in the UK is costing businesses around £2.8 billion annually.
Rutgers University in New Brunswick has announced that it is to spend up to $3 million (£1.9 million) preventing cyber hackers from damaging the university's networks through implementing stringent cyber security.
A hacking and trading group stole wire service information to buy stock and reap an illegal profit.
Sensitive personal information has been lost or stolen from councils in thousands of cases, research says.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.